lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <30625A62-4143-11D7-B71B-000393958954@kramse.dk>
From: hlk at kramse.dk (Henrik Lund Kramshøj)
Subject: Unusual request

On torsdag, feb 13, 2003, at 00:26 Europe/Copenhagen, Paul Schmehl 
wrote:
>
> I need this for a "security roadshow" that we're putting together, so I
> can demonstrate how easy it is to break in to an unpatched box.  Can
> anybody point me in the right direction?
>
> I don't want exploit code.  This is just a simple string that you enter
> into the URL box in a browser.  It's at least two or three years old, I
> know.
even though unicode is old I think it is still very nice, as the 
discussion
about "hackertools" and making these illegal are very stupid and this
is the example that takes this to the limit - since other people
consider Internet Exploder a browser - wonder why? :)

that said I have had much benefit of using the latest SQL worm as a
demonstration for people, thanks to digitaloffense for providing
the worm.pl program and descriptions

Using two laptops with a cross-over cable you can simulate the
Internet, and using an ordinary laptop I can start the worm using
a single UDP 376 bytes and then receives a flood of 25000
packets a second
(10.0.0.1 is sending using worm.pl, 10.0.0.2 is setup to use
10.0.0.1 as default gw - even though it doesnt try to forward the
packets)

some words of advise/ideas:
make sure you use two machines
go through the setup of those - important to spend enough
time on that
make an example website on the IIS, enough to let the audience
understand that this could be their own website
then use a few 'dir c:' and other "read information" from the IIS

and THEN baaam smack them with a defacement or similar

I have done that several times and it works great
- feel free to contact me if you want more info

Best regards

--
Henrik Lund Kramsh?j, hlk@...mse.dk

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ